EM Eye investigates a cybersecurity attack where the attackers eavesdrop on the confidential video data of cameras by parsing the unintentional electromagnetic leakage signals from camera circuits. This happens on the physical/analog layer of camera systems and thus allows attackers to steal victim’s camera data even when perfect software protections (e.g., unbreakable passwords) are all in place. Exploiting the eavesdropped videos, attackers can spy on privacy-sensitive information such as people’s activities in an enclosed room recorded by the victim’s home security camera. […]

Paper.

  • potatopotato@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    8 months ago

    Yeah, I’d agree with that.

    The point I was making was for people who thought this was cellphone cameras and that it would somehow work even if the camera wasn’t actively running.

    As far as war driving with an sdr you’d probably occasionally find something interesting, but the vast majority would be cameras just pointed back out at the street. I think you’d mostly see stuff where if you wanted to spy it would make more sense to hide your own camera because it’s already public.

    All that said, I would lose my shit if Hollywood did something believable for once and used this for a heist movie.